Results 21 to 30 of about 101,732 (243)
Inconsistency of the Wolf sunspot number series around 1848 [PDF]
Aims. Sunspot number is a benchmark series in many studies, but may still contain inhomogeneities and inconsistencies. In particular, an essential discrepancy exists between the two main sunspot number series, Wolf (WSN) and group (GSN) sunspot numbers ...
Arlt, R. +3 more
core +1 more source
ELIMINATION OF DATA MODIFICATION IN SENSOR NODES OF WSN USING DEEP LEARNING MODEL
This study focuses on removing the possibility of malicious data manipulation in wireless sensor networks (WSN) by utilising a deep learning method. When training deep neural networks, datasets that have been the subject of an attack that alters the data
B Chellapraba +3 more
doaj +1 more source
Process-Based Design and Integration of Wireless Sensor Network Applications [PDF]
Wireless Sensor and Actuator Networks (WSNs) are distributed sensor and actuator networks that monitor and control real-world phenomena, enabling the integration of the physical with the virtual world.
Casati, Fabio +10 more
core +5 more sources
Fisher Information of Mine Collapse Hole Detection Based on Sensor Nodes Connectivity
It is very important to detect a collapse hole for coal mine workers. The possibility of detecting the collapse hole using WSN is presented because the tunnel in coal mine is narrow and has poor working condition.
Shengbo Hu, Heng Shu, Xiaowei Song
doaj +1 more source
Applying Software Engineering (SE) processes is vital to critical and complex systems including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) and their applications are found in many military and civilian systems which make ...
Iman Almomani, Afnan Alromi
doaj +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
Localization in Wireless Sensor Networks: A Review
Wireless Sensor Network (WSN) has been a source of attraction for many researchers as well as common people for the past few years. The use of WSN in various environmental applications like monitoring of weather, temperature, humidity, military ...
Sneha V., Nagarajan M.
doaj +1 more source
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet +4 more
core +1 more source
The symbiotic organism search (SOS) algorithm is a promising meta-heuristic evolutionary algorithm. Its excellent quality of global optimization solution has aroused the interest of many researchers.
Shu-Chuan Chu +2 more
doaj +1 more source
Wireless Sensor Networks (WSNs) were exposed to several distinct safety issues and attacks regarding gathering and sending data. In this scenario, one of the most prevalent WSN assaults that may target any tier of the protocol stack is the Denial of ...
Kuraganty Phani Rama Krishna +1 more
doaj +1 more source

